The Imagely NextGen Gallery plugin for Wordpress prior to version 2.1.57 does not properly validate user input in the cssfile parameter of a HTTP POST request, which may allow an authenticated user to read arbitrary files from the server, or execute arbitrary code on the server in some circumstances (dependent on server configuration).
References
Link | Resource |
---|---|
https://www.securityfocus.com/bid/94356/ | Third Party Advisory VDB Entry |
https://www.kb.cert.org/vuls/id/346175 | Third Party Advisory US Government Resource |
Configurations
Information
Published : 2018-07-13 13:29
Updated : 2019-10-09 16:19
NVD link : CVE-2016-6565
Mitre link : CVE-2016-6565
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
imagely
- nextgen_gallery